[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 115.2 : Push notifications stored on disk in private browsing mode were not being encrypted potentially allowing the leak of sensitive information.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2 : Excel code.xll add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 115.2 : When checking if the Browsing Context had been discarded in codeHttpBaseChannel , if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 102.15, Mozilla Thunderbird 115.2 : Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 117, Mozilla Firefox ESR 115.2.0, Mozilla Thunderbird 115.2 : Memory safety bugs present in Firefox 116, Firefox ESR 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : A compromised content process could have provided malicious data to code FilterNodeD2D1code resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.

Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : A compromised content process could have provided malicious data in a code PathRecording code resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.

Mozilla Firefox 118 : In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to effect a sandbox escape if the correct data was leaked.

Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash.

Mozilla Firefox 118 : A hashtable in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1483

© SecPod Technologies